chapter four

4 Networking in Azure

 

This chapter covers

  • Creating and using virtual networks, subnets, and network security groups
  • Using best practices for creating and managing virtual networks
  • Distributing traffic from an outside network to internal resources

Where compute is the brains of a cloud project, the networks that connect them are the arteries and blood lines. Just like computing, you need networking for anything you do with cloud computing on Azure. There’s no choice. At times, the network parts of your infrastructure will be abstracted away from you, but they’re still there.

Now, we’ll focus on the Azure Virtual Networks (VNets) that you can control, manage, and make jump through hoops made of IP address ranges. When managed effectively, VNets in Azure can secure against intruders, optimize data efficiency, help with traffic authorization, and form part of your application’s internet footprint.

4.1 What is a virtual network?

When two resources on Azure need to communicate securely with each other, a resource needs to send and receive data with the public internet, or a service has to communicate with an on premises network, you have to use a VNet. Just like cars need roads to drive on, cloud data from services need VNets to travel through. Azure VNets also embody the very foundations of cloud computing we discussed in chapter 1: reliability and scalability.

4.2 Subnets

4.2.1 Classless Inter-Domain Routing

4.2.2 Logical separation

4.2.3 Routing optimization

4.3 Network security groups

4.4 Connecting networks

4.4.1 VNet peering

4.4.2 VPN Gateway

4.4.3 ExpressRoute

4.4.4 Which connection to use when?

4.5 Distributing network traffic with Azure Load Balancer

4.5.1 Public IP address

4.5.2 Backend pool and VM scale sets

4.5.3 Health probes

4.5.4 Load balancing rules

4.5.5 Putting it all together to create a Load Balancer